Day 1 - Thursday 03 October, 2024
Registration, Kick off and Introduction
Session One (12:30 - 14:30)
Morning Session - Part 1
- Global Cybersecurity Trends
- Global Cybersecurity Damages
- Industry Cybersecurity Trends
Lunch Break
Session Two (15:15 - 17:20)
Morning Session - Part 2
- Useful Threat Feeds
- Creating a Cybersecurity Strategy
- Case study #1: Colonial Pipeline Cyber Attack
Coffee/Tea Break
Session Three (17:30 pm - 19:00)
Afternoon Session - Part 1
- Choosing a Cybersecurity Framework
- NIST Cybersecurity Framework
- Performing Risk Assessments
Coffee/Tea Break
Session Four (19:10 - 20:00)
Afternoon Session - Part 2
- Conducting a Security Assessment
- ISO IEC 27001/ISO 27002
- Case Study #2: Chinese APT
End of Day
Day 2 - Friday 04 October, 2024
Recap of previous day
Session One (12:30 - 14:30)
Morning Session - Part 1
- Creating a Cybersecurity Implementation Plan
- The Roadmap Concept
- Selecting a Security Control Standard
- Alignment with Business Objectives
- Security Control Implementation (Continue)
Lunch Break
Session Two (15:15 - 17:20)
Morning Session - Part 2
- Security Control Configurations
- Security Control Prioritization
- Roles and Responsibilities
- Continuous Monitoring
Case Study #3: Drilling Deep
Coffee/Tea Break
Session Three (17:30 pm - 19:00)
Afternoon Session - Part 1
- Best Practices and Guidance
- Security Control Configurations
- Security Control Prioritization
- Roles and Responsibilities
- Continuous Monitoring
- Cybersecurity Regulatory Compliance
- Security Control Configurations
- Security Control Prioritization
- Roles and Responsibilities
- Continuous Monitoring
Coffee/Tea Break
Session Four (19:10 - 20:00)
Afternoon Session - Part 2
- Case study #4: Cyber Pirates
- Questions and Poll
Closing Certificate distribution End of Course